/os/ - Online Security

News, techniques and methods for computer network security.

Boards | Catalog | Bottom

Check to confirm you're not a robot
Drawing x size canvas

Remember to follow the rules

Max file size: 350.00 MB

Max files: 5

Max message length: 4096

Welcome to Online Security the place for internet and computer security, privacy and anonymity.
If you have some helpful tips please feel free to share your ideas. Start a new thread, or contribute to an existing thread.

Meta Thread Endwall 07/12/2016 (Tue) 12:03:36 [Preview] No. 171 [Reply] [Last 50 Posts]
Post any comments, concerns, or requests for the board in this thread.
Edited last time by Endwall on 07/12/2016 (Tue) 12:15:00.
24 posts and 6 images omitted.

Anonymous 02/11/2018 (Sun) 20:41:09 [Preview] No.1111 del
Why do you do it? Considering you have "school," a life to live, why would you sacrifice your resources for all of this?

Endwall 02/12/2018 (Mon) 05:05:49 [Preview] No.1113 del

Self defense primarily.

Read these threads the answer is in here:

Anonymous 02/14/2016 (Sun) 00:10:59 [Preview] No. 1726
About the developer:
I will remain anonymous as best I can.
I am not a professional computer scientist or programmer.
I have other commitments and can't maintain a continuous development cycle, but will work on this project sporadically as I have ideas or as issues emerge.Help and assistance on ideas are welcome. Critique and criticism of my tools are also welcome. Positive and negative reviews of experiences using endwall endset and endtools are also welcome.Point out any bugs that you find in the code and or errors in logic or in style or implementation that you find in the script and I may modify it in a release upon review.

Anonymous 02/13/2016 (Sat) 06:51:33 [Preview] No. 1693
1)My hope was to get some help with internet security by starting a thread asking for contributions of techniques and ideas. So far that's worked out pretty well. that ipsets thing has solved a major problem my server was running into. I'm glad I got that tip from here. Thanks >>1652 good work!

Message too long. Click here to view full text.

Endwall 02/12/2018 (Mon) 05:16:08 [Preview] No.1114 del
This entire board >>>/os/ is basically the last 30 mins of Star Trek 2: The Wrath of Khan, with Endwall in the staring roll as Khan, and Admiral Michael Rodgers in the Staring role as Captain James T. Kirk.

Endwall: "I spit my dying last spit at thee Rogers!!"
Admiral Michael Rogers: "ENDWAAAAAAAAALLLLLLLLLLLL!!!!!!!!!!!!!!!!!!!"

Anonymous 02/13/2018 (Tue) 21:59:58 [Preview] No.1118 del
There we go.

Endwall 02/18/2018 (Sun) 05:49:07 [Preview] No.1136 del

How I thought my computer privacy and security and anonymity was doing:
https://youtube.com/watch?v=e7X01_j_oDA [Embed]

How my computer security privacy and anonymity actually is:
https://youtube.com/watch?v=iPQfwmfRq2s [Embed]
https://youtube.com/watch?v=xrUEjpHbUMM [Embed]
Edited last time by Endwall on 02/18/2018 (Sun) 06:46:54.

Welcome to Online Security: Sticky Thread Endwall 07/13/2016 (Wed) 03:11:01 [Preview] No. 181 [Reply] [Last 50 Posts]
Hello and Welcome to /os/, Online Security. This is a board for the discussion of online security, privacy, anonymity, and news from cybersecurity and privacy world.
1.Follow the global rules
2.No Spam
3.No Classified Documents or leaks of Classified Documents or Files (News articles, or commentary about the documents or files is OK)
4.No Child Exploitation Material
5.Images should be safe for work and relevant to the post or thread, commentary can be NSFW
6.No Advertisements of Hacker Services or Solicitations for Hacking Services
Related Boards
tech >>>/tech/ Hacker >>>/h4x0r/ Security Concepts>>>/sec/ EndSoft >>>/endsoft/
Privacy Guides
Software Recomendations

Message too long. Click here to view full text.

Edited last time by Endwall on 05/11/2018 (Fri) 08:41:05.

Sticky Bump Endwall 10/23/2016 (Sun) 18:54:40 [Preview] No. 624 del
TENS , https://spi.dod.mil/lipose.htm , US Air Force Live CD <-- online banking for mom and dad.
LibertyBSD http://libertybsd.net/ , https://libreboot.org/docs/bsd/openbsd.html
Edited last time by Endwall on 01/02/2017 (Mon) 11:03:40.

Sticky Bump Endwall 04/30/2017 (Sun) 03:29:12 [Preview] No. 894 del
Heads https://heads.dyne.org/ http://fz474h2o46o2u7xj.onion ; Devuan non-systemd version of Tails (Disclaimer: Website/Project uses occult language with communist signals)
Devuan https://www.devuan.org/ http://devuanzuwu3xoqwp.onion
Systemd Free http://systemd-free.org/
Edited last time by Endwall on 10/07/2017 (Sat) 03:03:59.

Endwall 06/01/2017 (Thu) 08:14:41 [Preview] No. 933 del
Mozilla Firefox Hardened Profile

Endware Endwall 05/03/2016 (Tue) 08:54:28 [Preview] No. 32 [Reply] [Last 50 Posts]
Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.

iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.

spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.

alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.

mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.

Message too long. Click here to view full text.

206 posts and 3 images omitted.

Endwall 06/29/2018 (Fri) 08:23:14 [Preview] No.1237 del

>shebang is wrong.


what is wrong with the way I've done it? This is on the first line of all of the .sh scripts, or have I missed something? Did I miss this on a file?

I think that I'm doing this incorrectly with the .py files, as most scripts I've seen use /usr/bin/env python
while I point to /usr/bin/python which is a soft link to python2 or python3. I can change this if this is what you're talking about.


The BSD ports that are placed in the BSD folder were all tested on OpenBSD SH and were modified until they worked. I haven't updated these files in like a year or so, but they don't use any bash at all. There are no bash-isms in winstream.bat, although it's implemented inefficiently and needs an update / fix.

Can you give me an example of one of the bash-isms from my scripts ? Name the script and the number line(s), and offer an alternative notation. If I agree I'll fix it/ change it.

Message too long. Click here to view full text.

Endwall 06/29/2018 (Fri) 08:34:07 [Preview] No.1238 del

Do I need a space? I don't think it matters the ! should tell the shell to look at what comes next.

#! /bin/sh

I have some of the scripts as


others like endstream.sh had the space. I'll change them all to have a space. I don't think it makes a difference though.

Endwall 07/10/2018 (Tue) 23:10:51 [Preview] No.1245 del
I just realized what you were actually trying to say.

You meant to say:
"I use Debian with dash as the interpreter for sh and your scripts don't work, so you should shebang it as #!/bin/bash and it will work."

I actually did that with endwall_wifi.sh . I gave my mom a Debian laptop and she needed wifi so I extended endwall to loop over wifi interfaces. Anyways it spits errors due to dash being the interpreter for sh. Switching the shebang to bash makes it work. There are no "bashisms" in Endware, dash is just screwed up. I'm going to have to read about the differences some time when I do my port to Debian.

Endwall 07/10/2018 (Tue) 23:12:06 [Preview] No.1246 del
I also just fresh installed a server with Parabola base-openrc and endwall.sh was spitting errors, I used another version of the file and it worked fine. I haven't tracked down the issue yet. I need to debug it by putting in echo statements. I'll do some more work on that later.

There are now open-rc scripts for most of what I need for server work including (postfix, dovecot, nginx, syslog-ng,squid, sshd etc) tor I compile and run from the shell, however ipsets doesn't have a script so I can't use this for a clearnet web or mail server yet.

Endwall 07/18/2018 (Wed) 03:24:27 [Preview] No.1253 del

I've fixed the error with endwall.sh and endwall_wifi.sh. It was a typo in an if statement on the loop over interfaces. Should work properly now.

That bug was there for 8 months and no one posted anything about it...

Maybe nobody uses it or nobody cares...

Well it's fixed now in any event.

Online Security News Endwall 07/07/2016 (Thu) 06:09:23 [Preview] No. 149 [Reply] [Last 50 Posts]
See a news article or CVE bug report on an emerging computer security issue and want to share it? Post below.

I will also post links to Hak5 Threatwire videos.
Edited last time by Endwall on 07/07/2016 (Thu) 16:22:47.
497 posts and 3 images omitted.

Endwall 06/15/2018 (Fri) 08:35:37 [Preview] No.1230 del

Facebook’s Secret Device Partnerships - ThreatWire 9:57
https://youtube.com/watch?v=SUerM7ul8tM [Embed]

Hackers Could Sink Ships - ThreatWire 9:15
https://youtube.com/watch?v=OH8aBZgsvEw [Embed]

Endwall 06/21/2018 (Thu) 23:56:54 [Preview] No.1235 del

Malware on Macs? GnuPG is Flawed & Docker Hub Has a Problem - ThreatWire 10:54
https://youtube.com/watch?v=1jDzqzgmbz8 [Embed]

Endwall 07/05/2018 (Thu) 05:00:18 [Preview] No.1239 del
Hak 5

Location Data? Come Back With A Warrant! - ThreatWire
https://youtube.com/watch?v=CGkEuiIc8NY [Embed]
The Supreme Court ruled in favor of privacy advocates everywhere, Cell phone Carriers Stop Location Data Sharing, and you can totally Steal online Accounts Through Audio Files.

California’s New Privacy Bill, Exactis Leak, & Gentoo Guthub Hacked - ThreatWire
https://youtube.com/watch?v=hqCc7cE3sn4 [Embed]
Gentoo’s github account was hacked, a Marketing Firm Leaks Private Data on millions, and a new GDPR-like bill was signed into law in California. All that coming up now on ThreatWire.

Endwall 07/05/2018 (Thu) 05:04:53 [Preview] No.1240 del
I saw this on 8-chan:


Police searches homes of „Zwiebelfreunde“ board members as well as „OpenLab“ in Augsburg
2018-07-04 08:12:30, 46halbe

On June 20th, board members of the „Zwiebelfreunde“ association in multiple German cities had their homes searched under the dubious pretence that they were „witnesses“ while their computers and storage media were confiscated. The Augsburger CCC offshoot „OpenLab“ also had to contend with a search of their premises. For seven years, the Zwiebelfreunde association has been promoting and creating privacy enhancing technologies, while also educating the public in their use. At TorServers.net, the association operates Relays of the Tor anonymising network while helping operators technically and legally. In addition to this, the association helps other organisations raise funds. The board members of the association are not considered suspects but witnesses in the ongoing investigation. The story behind the searches and seizures is somewhat convoluted: There was an anonymous website on the internet, calling for protests against the far-right Alternative for Germany (AfD) party convention in Augsburg. The unknown operators of this website used an e-mail address at Riseup, a well-known alternative provider. [1] The Zwiebelfreunde association has a bank account to facilitate donations to riseup.net.

Riseup is domiciled in the US, and essentially offers a non-commercial alternative to Gmail. Because data-protection practices are in decline world-wide, many NGOs and grassroots organisations use Riseup.These facts have not yet reached the police in Bavaria. The state prosecutor’s office in Munich has apparently been operating on the mistaken assumption that everyone even tangentially connected to Riseup would be able to provide information on any e-mail account registered there, including that of the alleged illegal website. [2] The officers on the scene made clear that they themselves felt this assumption would not hold and said so to the witnesses. But they performed the searches and seizures anyway.With such contrived reasoning, almost anyone could be searched if the anonymous website had been operated by people with a Gmail address. As a consequence of this clearly nonsensical attempt at logic, those involved in this as witnesses and their families have had to endure abjectly disproportional intrusions into their homes. Homes were searched without anyone even attempting to question the alleged witnesses.

A multitude of storage media, computers and other devices were confiscated, also affecting family members of the association’s board members - none of whom stands accused of a criminal act. Also affected are completely unrelated businesses and sensitive projects of Zwiebelfreunde, such as the Tails Linux distribution. Some of those involved have had their requests to return the hardware denied....

Endwall 07/18/2018 (Wed) 03:19:34 [Preview] No.1252 del
Hak 5

Fortnite Hackers Get Hacked, Mapping Public Fitness Data on Polar - ThreatWire
https://youtube.com/watch?v=MuV2nzjiKkM [Embed]

OPSEC Endwall 08/23/2016 (Tue) 01:08:39 [Preview] No. 357 [Reply] [Last 50 Posts]
Discuss best practices for operational security.
12 posts omitted.

Endwall 03/26/2018 (Mon) 00:15:49 [Preview] No.1168 del
For better effect also disconnect any phones from your work study where you have your computers. And when doing sensitive things also disconnect your speakers from your desktop (Power off button or remove the input cord to your soundcard and power cord from the wall). Don't use WIFI anywhere, unless you're in a bind. Keep all your tcp/ip connections wired and firewalled. Don't use wireless 2.4GHz phones either. Don't give the party van more remote info to collect or ways to penetrate your residence remotely.

Personal and sensitive communications should be made face to face, or signaled using gpg or through other encrypted communications methods. Make sure the person you're talking to isn't a retard carrying a cellphone in their jacket pocket, and make sure to ask them about this before you start your conversations, and if they have a cellphone tell them to turn it off and remove the battery before you start your conversation.

Anonymous 07/12/2018 (Thu) 19:23:11 [Preview] No.1248 del
copied from:


(1) Don't use social media [Avoid Facebook/Myspace/Twitter/Snapchat/etc.] (no brainer) Tell your friends to just hang out with you face-to-face instead of using social media.
(2) Forward secrecy (keep your mouth shut about any personal info if you don't want to expose yourself)
(3) Use a cheap private VPN (w/ no IP logging policy) and Tor browser! You can also use an OS like Whonix or Tails to spoof your MAC address in extreme cases.
(4) Always disconnect your internet (physically) when you are not going to use it! Make sure bluetooth and WiFi is physically disabled/disconnected. Don't keep your modem online all the time! If you do, you are asking to be hacked!
(5) Use an old "flipper" phone. AKA a jitterbug. Cover up any camera if has one. Jitterbugs are basic cellphones for people with disability problems / senior citizens! Just a bare basic cell phone where you can take out the battery. Has no internet platform. Any kind of device that has a camera you might want to consider covering up because they can easily be hacked to spy on and identify you remotely.
(6) Flock to flea markets, garage sales, thrift shops to buy older electronics! Do not by 'smart' or 'green' appliances! Learn how to maintain and fix older products/utilities too! All IoT (Internet of Things) tech can be used to spy on you, avoid IoT and 'home automation' technologies! Trojan horses, all of them.
(7) Never put your real name or personal info into your computer, always use FAKE names / aliases.
(8) Use cash whenever possible. Credit Card and other digital transactions can be tracked and directly linked to you. Cash could be tracked back to you too, but it is much harder and takes a lot of effort and human resources for governments to do.
(9) No OS is safe. Just exclude as much personal information you can from your Operating System. Make sure its disconnected offline when not being used! Make sure bluetooth and WiFi is also physically disabled/disconnected when not in use. If you use a "hot spot" which I do NOT recommend, at least turn it off and put it inside a little faraday cage bag when not being used (to prevent more sophisticated remote tampering).

Anonymous 07/12/2018 (Thu) 19:27:21 [Preview] No.1249 del
(10) Always bleach you browser cache / cookies / web logs! 35x gutmann style! (Bleachbit, Ccleaner, etc.)
(11) Browser Security: Use Noscript Security Suite add-on. Noscript is a must: make sure to block all global scripts, wipe the whitelist in Noscript and re-configure the whitelist that best fits your browser habits. IPFlood is also a useful add-on to obfuscate IP GET requests. You should use Random Agent Spoofer (or Blender) to spoof your browser & OS metadata while you surf the web, making it a lot more difficult to track your activity. Tin Foil is another great security addon. Also, make sure WebGL and WebRTC are disabled in about:config (research how to disable those, there are tutorials out there).
(12) Its best to have two computers, rather than just one. For example, have one just for banking / legit LEGAL purposes. Have another one (completely separated) just for private or illegal activity. Make sure you don't put any personal info in the private computer.
(13) Use encryption and strong passwords! Write them down on a piece of paper or memorize them. DO NOT store passwords on a computer file. That is a big no-no! Try easy to remember long sentences for passwords, and combine all the words together. The more characters used, the harder it is for hackers to break the passwords.
(14) Have separate email accounts for each kind of activity (legal or not, don't matter).
(15) Make sure you physically disconnect your web cam or cover it up with black electrical tape. Most laptops these days come with web cams attached above or below the monitor. Make sure the camera cannot be used to identify you or spy on you in any way. (Yes, webcams can be hacked / remotely hijacked to spy on you!)
(16) Avoid new "Smart TVs" (they spy on you too)! If you have a newer TV, make sure you cover up or unplug the camera and microphone. Or keep it offline and disconnected from the cable box when not in use. You could cancel cable and just rip DVDs of your favorite movies and shows instead, using them on an offline TV set.
(17) Avoid all new digitized vehicles. They can easily be hacked, used to spy on you and even be remotely hijacked by criminal entities/governments!
(18) Never allow another person to use your computer. Make sure you routinely backup important files to a flashdrive or DVD and store that data offline. Also make sure you have a backup copy of the OS you use as well as backups of the software you use. If you ever have problems with your OS someday, just wipe your partitioned OS, and then re-partition the OS again yourself from scratch. Do not allow others to 'fix' your computer, they could easily steal information from your OS you might not want them knowing about. Geek Squad works with the FBI and other agencies to steal data from their customers, do not trust them to fix or repair your computer.
(19) Any photos you take with modern cameras contain EXIF metadata that contain GPS coordinates among other data used to identify the owner of the photo. If you store your modern photos online, people will be able to identify you. Don't do it! I repeat: do not post modern photos online unless you want to be identified! (I have been told PNG formats do not store any metadata, so photos converted to PNG might be safe).

Test your online privacy and learn more: https://www.privacytools.io/

Anonymous 07/13/2018 (Fri) 15:50:44 [Preview] No.1250 del
I might as well add this report to this OPSEC thread: https://archive.fo/bBjkm

Do not allow any electronic made after 2018 into your home and you better have some backup older electronics which don't have cameras and hidden mics. The Wall Street Journal just rubbed it in our face that this is going to become the norm very soon as they will be embedding tiny microphones in almost every single thing they can get away with. So anything digital beyond 2018: don't buy it.

And do avoid things like Echo, Siri and other crap created by the big tech monopolies. Make it clear to your family, relatives and friends you won't allow this around your presence (or at least in your own residence). It is all up to us to wake others up about how they are stealing our data and selling it all over the world and if we allow it we are stupid as a bunch of rocks.

Endwall 07/13/2018 (Fri) 23:55:01 [Preview] No.1251 del

I agree cook your own food. Buy from the local farmer's market, or from the grocery store. Cook your own food in your own house. Don't order in. As you mentioned its easy to poison you once they know your pattern. You call for take out and they intercept the delivery or have someone planted there to poison your pizza.

I just meant to say don't do crime or talk about crime or personal things on the phone, no phone sex, no dirty talk, just innocuous facts, and lawful business. "Hey are we low on milk? Yeah OK I'll pick some up, bye." Nothing about money, politics, drugs, crime, or sex. It's all being recorded digitally and stored, and if you become a "Person of Interest" they go through it and pin point all the incriminating stuff to use on you for blackmail, coercion, criminal indictment, front running etc.

Its too bad that they removed all of the public pay phones...If there were no cameras in the area you had a small level of anonymity (very small). We're going to have to look to an encrypted VOIP by tcp solution for a "Secure Line". Even then don't trust it too much.

System Resources Endwall 07/05/2017 (Wed) 03:13:35 [Preview] No. 965 [Reply] [Last 50 Posts]
I have some observations to make.

## I just tested these systems:
MS DOS 6.22 runs in 384K of memory (1994)
MS Windows 3.11 runs in 2MB of memory with a full mouse driven GUI (1994)
Macintosh OS 7.53 runs in 7.4MB of memory , full GUI + TCP/IP (1996)
Macintosh OS 8.1 runs in 13.2MB of memory, (1997)
Macintosh OS 8.6 runs in 26MB of meomory, (1998)

OpenBSD 6.1 starts in text mode command line in 27MB of memory
OpenBSD 6.1 in Xenocara uses 65-80MB of memory to start up.

## from recollection:
Windows 7 800MB of memory (2009)

Parabola GNU/Linux starts in text mode cli using 150MB of memory
Parabola GNU/Linux in weston uses 300MB of memory

Message too long. Click here to view full text.

Edited last time by Endwall on 07/05/2017 (Wed) 03:17:31.
8 posts and 3 images omitted.

Anonymous 08/27/2017 (Sun) 17:39:20 [Preview] No. 1008 del
>OpenBSD 6.1 starts in text mode command line in 27MB of memory
Uses less than that for me.
This depends on architecture, with amd64 and i386 being some of the most memory using ones.

Endwall 09/19/2017 (Tue) 07:03:03 [Preview] No. 1031 del

I trust FreeDOS more than I trust GNU/Linux. Get your system back up and running. I used to run this on a Pentium III system but it corupted the file system twice in a row after copying some files into the games directory. I Wiped and reinstalled, and tried it again same result. So I stopped using it, and started using MS DOS instead. But that aside I think that FreeDOS and OpenGEM have a real future. I think that FreeDOS should be an important part of the private computing future. They just need to port a heavy duty file encryption program to the base system and I'm sure gpg is already ported. When you get your system back up please post the memory usage results. Thanks!

Endwall 09/19/2017 (Tue) 07:06:02 [Preview] No. 1032 del
The machine I used is a SunBlade 150 UltraSparc IIi 550MHz computer from 2003.

Anonymous 09/27/2017 (Wed) 21:38:23 [Preview] No.1038 del
I don't want to sound cliché but I suspect great part of the RAM in parabola is thanks to systemd.

Don't give up on GNU/Linux, there are some distros that take it to extremes to cut the packages to minimum. Source Mage in particular has the philosophy of only including what you want, nothing more, and the sources are clean and untouched. I don't have access to my installation but as soon as I get it I will post results, meanwhile look at how some guy went to have a graphical environment with 97MB.

Endwall 07/12/2018 (Thu) 08:34:29 [Preview] No.1247 del
Fresh install of Parabola/GNU/Linux-Libre/OpenRC

On an Intel core2 laptop

boot into cli from OpenRC

$ free -h

used 60 MB

start xorg as root

# startx

# free -h

used 75 MB

Message too long. Click here to view full text.

Internet Security General Anonymous 04/16/2016 (Sat) 07:56:30 [Preview] No. 4 [Reply] [Last 50 Posts]
Continuing from >>>/tech/597
This is for non specific, general tips for anonymous web browsing and downloads, tips on browsers and browser configurations for the security concious that you don't want to make a new thread for.
88 posts and 7 images omitted.

ZyBxVLcAxIx Grace 06/09/2018 (Sat) 09:30:28 [Preview] No.1229 del
David Beckham has admitted that a big part of him has questioned whether he was right to retire from professional football but that he has been too busy over the past four months to dwell on the decision.

Hey that's great news. He's still in pretty good shape. He'll be signed in no time. Hope he gets a good contract!
No Spam 6 Month Ban
Edited last time by Endwall on 06/11/2018 (Mon) 07:00:31.

Anonymous 07/05/2018 (Thu) 23:59:13 [Preview] No.1241 del
Check out the bleeding edge tor source code!!


torsocks git clone http://dccbbv6cooddgcrq.onion/tor.git

Anonymous 07/06/2018 (Fri) 01:26:42 [Preview] No.1242 del
You can still do the 6 hop mod but in src/core/or/circuituse.c after you change default_path_len to 7 delete the line under it that says
else if fourhop_cutoff

also in src/core/or/or.h you can still change default_route_len to 6 but there is no option to modify max_recent_circuits from 1000 to 100

Endwall 07/06/2018 (Fri) 03:46:26 [Preview] No.1243 del
It compiled for me and linked in


I haven't fully tested it yet though.

But you're correct the options have all been removed from or.h . Also much of the code has been moved around and segregated into different sub directories.

Keep an eye on this. Also if you have any other good Tor mods please feel free to share.

Endwall 07/06/2018 (Fri) 04:03:41 [Preview] No.1244 del
circuitstats.h: * 1000 is approx 2.5 days worth of continual-use circuits. */
circuitstats.h:#define CBT_NCIRCUITS_TO_OBSERVE 1000
circuitstats.h:#define CBT_MAX_RECENT_CIRCUITS 1000
circuitstats.h:#define CBT_MAX_MAX_RECENT_TIMEOUT_COUNT 10000
circuitstats.h:#define CBT_MAX_MIN_CIRCUITS_TO_OBSERVE 10000
circuitstats.h:#define CBT_DEFAULT_TIMEOUT_INITIAL_VALUE (60*1000)

this seems to have been moved into src/cor/or/circuitstats.h

use grep to search for other missing / moved variables. Thanks for the tip >>1241 , >>1242 .

Discussion Thread Endwall 02/24/2018 (Sat) 01:52:08 [Preview] No. 1145 [Reply] [Last 50 Posts]
Want to say something off topic about anything?

Have a hot tip about something in the computer security world that doesn't fit into any current thread or category?

Want to chat with your fellow invisible 7 proxy friends?

Want to tell Lt. Gen Michael Hayden, GEN Keith Alexander, ADM Michael Rogers, GOOGLE, AMAZON, FACEBOOK and Microsoft etc. how you feel?

It's open mic at >>>/os/ , anything goes!!

Put all of your banter here:
3 posts omitted.

Anonymous 04/11/2018 (Wed) 00:45:14 [Preview] No.1200 del
Watching the Zuckerberg testimony to the Senate Judiciary & Commerce Commitee on C-SPAN2.

This Zukerberg guy seems to think that we're dumb. He keeps saying that Facebook only knows about what you share in terms of likes, dislikes, and pictures.

Here's something that they do: They track who's pictures you click on, how many you look at, and how long you linger on a picture or on someone's page, they also track who you creep on from people not in your friends list. They can use this to harass you and blackmail you. They can use this to determine your sexual orientation, and determine who you find sexually appealing, without you sharing the information explicitly, among other things. They also build extensive profiles on your political viewpoints, and track and monitor all of your connections and affiliations.

None of it is private. Don't use this service. It's a PRISM service provider, and can be used to triangulate your position and activities in the real world, and preempt and stop you from doing activities. RUN. Don't use it.

If you have to use it for business, be careful, be aware that it is an intrusive surveillance platform. Nothing you do on it is private, it's all tracked and stored in a database. They track all of your clicks, and database all of it and use it to determine information about your preferences that you don't actually share. Using very sophisticated statistical data mining. They also share this data with many more 3rd parties than just the Government of the United Sates of America. Don't use it if you can avoid it.

Anonymous 04/20/2018 (Fri) 08:19:36 [Preview] No.1206 del
hmm, I checked again and it's up again.

Endwall 06/18/2018 (Mon) 22:44:25 [Preview] No.1231 del
Can someone check these links for me or do some kind of analysis:

Endware Hidden Service
'Best Practices in Secure Computing

The Endware hidden service is down and I can't figure out why. The connection is up, and the server is up. I think I've been blacklisted from a tor directory or tor directories plural.

Any insight is appreciated. Thanks.

Endwall 06/18/2018 (Mon) 22:54:33 [Preview] No.1232 del
I think Sulu just fired his photon torpedos at me.


Endwall 06/19/2018 (Tue) 07:52:41 [Preview] No.1233 del

I'm not sure what the problem was; it didn't seem to be on my end. My guess is that some tor directories went down, but I'm not sure what else was going on. Anyways I deleted the host name and private key and restarted tor and it seems to be working again. As far as I can tell my servers were not compromised, this problem wasn't on my end or server side, and had something to do with the Tor network. I can access both web pages now.

Here is the new url for the Endware Hidden Service:


Cryptography Endwall 05/12/2018 (Sat) 20:26:54 [Preview] No. 1211 [Reply] [Last 50 Posts]
In this thread we will discuss cryptography, cryptosystems, crypt-analysis, and tools for cryptography such as gpg and other tools. If you work in this field or hear of some relevant news about this field feel free to contribute. Use hyperlinks and source citations to back up any claims made if necessary.

Endwall 05/12/2018 (Sat) 20:33:48 [Preview] No.1212 del
Some introductory questions:

1) What are some good books on this subject both mathematical and practical?

2) What are some good methods to defeat crypt-analysis like frequency analysis to include when doing standard encryption methods like RSA using gpg? Would padding the plain text message before encryption with arbitrary random ASCII on both ends help or hinder this process?

3) Why is the trend for modern crypto to move away from using prime numbers towards elliptic curves? Speed? Security? Lower computation time?

Feel free to ask your own questions or to answer any that you see if you are knowledgeable on the subject field.

Endwall 05/13/2018 (Sun) 07:18:05 [Preview] No.1213 del
I'm suggesting to pad your messages with passgen.sh as I think that it might be helpful.

$ passgen >> message.txt
$ nano message.txt


This is the message. Have a nice day!


$ passgen >> message.txt

$ gpg --list-keys | more
$ gpg -e -a -r Endwall message.txt

Message too long. Click here to view full text.

Endwall 05/13/2018 (Sun) 07:24:32 [Preview] No.1214 del
Of course do this on your air gap and shuttle the messages and replies by floppy disk to your transmission workstation. Do encryption and decryption on an air-gap, and move the messages by floppy disk message sneaker net FDMSN . That should mess them up really good. If they can still get to your messages after that then re-evaluate the trustworthiness of the counter-party correspondent.

Endwall 05/13/2018 (Sun) 07:25:53 [Preview] No.1215 del

This is the message


Message too long. Click here to view full text.

Endwall 05/13/2018 (Sun) 07:29:29 [Preview] No.1216 del
Why stop there? Pad every paragraph!!

Hardware Endwall 09/18/2016 (Sun) 18:31:31 [Preview] No. 580 [Reply] [Last 50 Posts]
Discuss hardware and alternative hardware concepts to increase computer and online privacy and security.
Edited last time by Endwall on 09/18/2016 (Sun) 18:50:04.
8 posts and 1 image omitted.

Anonymous 08/21/2017 (Mon) 22:34:40 [Preview] No. 1002 del
>Minifree isn't recommend or trusted anymore
>a shop owned by Libreboot main developer is not trusted anymore
Okay, shill. Take your overpriced garbage list and go back to reddit. You really added nothing new to value. instead of pointing to actual hardware with libre support like wireless chipsets with ath9k firmware or marvell-chipset based routers with 802.11ac support or mediatek-based NAS that runs fully free software you posted some Libre© TecnoPenguin™ overpriced jew shit.

>Libre Tea Computer Card
>still not FSF approved after 2 years of screeching
>absolutely harmful hardware lifecycle model
>le 3d printed laptop meme, 1366x768 15" screen
>not knowing about Neo900 and Openmoko

Endwall 09/03/2017 (Sun) 23:52:30 [Preview] No. 1011 del

RC2014 is a simple 8 bit Z80 based modular computer originally built to run Microsoft BASIC. It is inspired by the home built computers of the late 70s and computer revolution of the early 80s. It is not a clone of anything specific, but there are suggestions of the ZX81, UK101, S100, Superboard II and Apple I in here. It nominally has 8K ROM, 32K RAM, runs at 7.3728MHz and communicates over serial at 115,200 baud.

RC2014 is available in kit form for you to solder together.  Through-hole components are used throughout, making soldering easy, even for those with limited soldering experience.  Along with a selection of modules to extend functionality, such as serial terminals with HDMI output, digital input modules or, simple keyboard, the RC2014 is a very adaptable computer.

Assembly guides can be found here:

Module information including schematic diagrams and technical descriptions can be found here:

GitHub repository can be found here:

Google Group for RC2014 owners can be found here:

Message too long. Click here to view full text.

Endwall 09/04/2017 (Mon) 00:33:49 [Preview] No. 1012 del
As soon as you turn RC2014 on you can start programming in Microsoft BASIC.  This is very easy to get started with and some very complex programs can be written.  To get right down to the metal, though, you can write your programs in Z80 machine code.

Development of the RC2014 has lead to a more powerful machine with pageable ROM, 64k RAM, compact flash storage and a whole range of expansion peripherals.  With the right modules, it’s now possible to run CP/M, which opens the RC2014 up to a wide range of software.

RC2014 can be bought from Tindie:

Endwall 09/06/2017 (Wed) 21:07:20 [Preview] No. 1016 del

Z80 Retrocomputing 18 - Z180 CPU board for RC2014
https://youtube.com/watch?v=D9u9hhNjcEY [Embed]
Dr. Scott M. Baker
In this video, I build and try out a Z180 CPU board to replace the Z80 CPU in my RC2014 retrocomputer. Aside from simply being faster than the Z80 that I'm currently using, the Z180 offers a lot of on-board peripherals (serial IO, timers, interrupt controller, mmu, dma, etc). I benchmark the 20 Mhz Z180 against my 7.3728 Mhz Z80. I'm saving exploration of the onboard peripherals for a future video. For more retrocomputing projects, see http://www.smbaker.com/

YM2149/ AY-3-8910 Sound Card for the RC2014 computer
https://youtube.com/watch?v=-iLwi9FagFE [Embed]

rc2014-ym2149 Designed by Ed Brindley
Demonstration of my sound card for the RC2014 computer. The board is Open Hardware and was produced entirely with Open Source Software (as was this video) PCB now available on Tindie:
Schematics and Gerbers for the board are available here:
Edited last time by Endwall on 09/06/2017 (Wed) 21:07:58.